To keep up to date with all the technologies in SQL Server, the DBA or developer who wants to stay ahead is faced with the struggle of constant learning. With every new release, it seems that at least one entirely new application platform appears, alongside innumerable additions to, and improvement of, existing features. How do you keep up while avoiding information overload, unnecessary detours and dead-ends?

The SQL Server Stairways is our solution to this problem. Designed to smooth out even the steepest learning curve, each Stairway is a SQL tutorial series focused on a single topic and is arranged into no more than a dozen easily-navigable tutorials that we call 'steps'. Each step is the length of a typical magazine tutorial, and emphasizes practical, hands-on learning, with just enough background theory to help you understand the topic at a deeper level.

Using straightforward language and avoiding jargon and marketing babble, each Stairway tutorial series is designed to take you from zero knowledge of a particular SQL Server topic, to a level of practical understanding that will allow you to start using that feature in a production environment. The learning gradient is steady and manageable, but also brisk. You won't be wasting time.

Our team of Stairway Editors, including Kalen Delaney and Brad McGehee, have selected technical topics that all SQL Server DBAs and developers can benefit from mastering, and have persuaded leading experts in those fields to author them.

Topics covered:
Define and articulate the term MetaArc and the technologies, tools, services and partnerships that it encompasses.Describe the drivers, market drivers, and client issues that MetaArc addresses.Increase client confidence in Fujitsu by demonstrating your ability to recommend, refine and position propositions enabled by MetaArc.Target Audience: Sales

Learn about K5, our next-generation cloud platform specifically designed for enterprise customers and one of the four sets of capabilities within our MetaArc portfolio.You must login with the G05 domain name instead of the default CORP
eg. G05\\xxxxxx

Learn about our MetaArc digital enablement platform, Hybrid IT and K5
There is a certification exam for each module.
Login: same as your login to your laptop, be sure to select G05 in the dropdown menu when prompted.

Play Recording

There's a lot of talk about IoT, but few entities deliver real, customer-funded projects with clear business benefits. GlobeRanger is one of them. Having deployed solutions in more than 300 facilities, connecting more than 20,000 devices, GlobeRanger gives Fujitsu IoT credentials and a ready-to-use IoT platform. Selling IoT is different. Success starts with consultative selling: understanding the customers' operations and pain points, then delivering a business solution using technology. Focus on selling the problem you solve.Join us for our latest training session in the Americas to share how GlobeRanger delivers real and quantifiable benefits to customers.

If you have questions or would like more information prior to the session, pleasecontactNabil Lodey.

This session helped us discover how Fujitsu's new Cloud Service K5 aligns with our Managed Hybrid IT services to help customers exploit the enormous potential of digital business and maximize the value of existing core systems.

Recording

Presentation

You must log in with your G05\\username credentials (instead of Corp\\username)

"DevOps can indeed be a positive influence on ITIL, enabling improvements in various processes across the service lifecycle. A more collaborative DevOps approach adds value in service strategy, by ensuring that operations and development functions are included during the development of overall IT business strategy. A DevOps approach also adds value during service design, by ensuring that design coordination includes active participation from both operations and development—resulting in the potential for designing improved functionality and performance, as well as operational support. During service transition, a DevOps approach facilitates the effectiveness and efficiency of both change management, and the process of release and deployment management. By encouraging greater collaboration between development, operations, and indeed all IT functions, a DevOps approach can facilitate knowledge management as well. During service operation a DevOps approach can help ensure closer collaboration between the service desk and backline support and development teams—resulting in more effective incident and problem management. It also emphasizes the need for applying automation to change management as well as release and deployment management "models—thereby facilitating the frequency of deployments, more consistent delivery of new and changed releases, and improved quality. Continual service improvement (CSI) also benefits from a greater level communication and collaboration between development and operations teams, resulting in a higher level of teamwork, synergy, and creativity. The result is a greater likelihood of identifying improvement opportunities across the lifecycle, many of which will be turned into formal CSI improvement proposals - some of which will be approved and chartered for implementation. The result: higher performance, lower costs, and improved service quality."

The most perfect system can fail if the change is not managed. Throughout the earlier phases of solution delivery, Macroscope reminds us of things that can pave the way for a successful implementation. In the implementation phase, all those preparations are brought to conclusion. In addition to the mechanics of conversion, installation and set-up, we see a strong emphasis on the organizational change - communication, training, work redesign, etc.This event familiarizes learners with the implementation phase and its deliverables and also reinforces the need to prepare for implementation throughout the solution delivery process.

The Architecture phase purpose is to elaborate on the findings of the Preliminary Analysis ("PA") phase, to stabilize the architecture and to reconfirm feasibility. As such, the goal is to do enough to minimize rework in subsequent release development, while deferring detail decisions that do not affect stability nor feasibility. "Knowing when to stop" is a key skill. It requires a multi-disciplinary team to integrate business perspectives, architectural concerns and organizational change management issues as well as development strategies.

This learning event enables the learners to use Macroscope material to plan system architecture stabilization in their own situations.

An excellent time to take this course is about 4-6 weeks before the conclusion of the PA phase - because it clarifies work that can be deferred from the PA phase to this one.

Inspired from a book by Mary and Tom Poppendieck, this presentation is an adaptation of the Lean Approach based on the Toyota Production System in the IT domain.
Once the 7 Lean Software Development principles are revisited, 24 imaged viewpoints will provide a different approach to dealing with possible problems encountered in the field of IT.

Architecture modeling techniques assist the system architect to develop the underlying framework for the system: decomposing it into sufficiently small pieces to master the complexity, partitioned in a way that increases cohesion and reduces coupling, and done to comply with design patterns and standards. The end result is systems that are highly stable, flexible, extensible, usable and effective.Object-oriented modeling is a synthesis of many of the important advances in modeling in the last three decades (e.g. modularity, encapsulation, state transition modeling, use case analysis).Note that P220-3 is an almost-identical event, but using traditional data process notation instead of the Unified Modeling Language used in this event.

In this session we'll take the concepts introduced in Part 1 and go even deeper. We'll provide a technical overview of the new application model and end-user application catalog that delivers this flexible working environment. Learn how best to design and deploy an optimized Configuration Manager 2012 infrastructure as well as some best practices and tools for migrating from SCCM 2007.

Are you ready for Microsoft System Center 2012 Configuration Manager? We are excited about our most important release ever for client administrators. Configuration Manager 2012 is user-centric, manages heterogeneous devices and introduces a new way to deploy applications; these capabilities will help you enable the Consumerization of IT, reduce costs, and drive agility for your organization. But there is more...a NEW interface, improved setting management, role-based administration, and infrastructure reduction. Get up to speed on all the key new capabilities of Configuration Manager 2012. We'll also provide a quick overview of Windows Intune, for those looking for a cloud based management for their unmanaged PCs.

End users are bringing consumer devices into the organization! iPhones, iPads, Tablets and Smartphones are now part of the corporate environment. New desktop technologies such as VDI, Tablets, Consumerization, among other pressures, are causing many IT environments to consider re-architecting their desktop infrastructure. Learn how to separate myths from facts, learn how to develop a strategy focused on meeting your users desktop requirements based on roles / personas, rather than implying that one technology fits all, and discover Microsoft and partner solutions that enable a Flexible Workstyle.

Learn how to make the magic from the keynote come to life for your organization. Get an overview of the key improvements in System Center 2012, the design principles for 2012, how those features will benefit your organization, and finally how you can implement within your organization to achieve business value.

1st presentation in a complete set of 8.
Cloud computing and the delivery of true IT as a Service is one of the most profound industry shifts in decades. Join Jeff Woolsey, Principle Program Manager, Microsoft's Management and Security Division, as he shares Microsoft's vision for cloud computing and shows how System Center 2012, as part of the Microsoft private cloud, will enable you to deliver the promise of cloud computing in your organization today.

This docuement is designed to help Fujitsu sales, marketing employees and any interested consultant to :
1. Answer the basic questions that exist today in most bids around our sustainability performance, credentials and CSR program.
2. Provide a comprehensive overview of our Global Sustainability Capability including Products, Data Centers, Smart Solutions, Consulting and other services.
3. Understand at a high level the market issues at play in the GBG regions, to address multiregional bids with relevant local understanding
4. Provide links to relevant case studies and further information
5. Outline our overall story and sustainability messaging.

In the context of the upcoming Solution Architecture career path this module covers the process and techniques of Requirement documentation.
It covers all major steps including requirement determination, analysis and validation.
We believe this is an important aspect that applies to most of our delivery projects.

In the context of the upcoming Solution Architecture career path this module covers the process and techniques of Requirement Documentation.
It covers all major steps including requirement determination, analysis and validation.
We believe this is an important aspect that applies to most of our delivery projects.

In the context of the upcoming Solution Architecture career path this module covers the process and techniques of Requirement Documentation. It covers all major steps including requirement determination, analysis and validation.
We believe this is an important aspect that applies to most of our delivery projects.

This Power Point presentation contains the latest wins from the New York office that pertain to Salesforce in various industries but mostly, the financial services sector. It is available to help turn our RFP's into winning proposals.

Virtualization separates applications, desktops, machines, networks, data and services from their physical constraints. Virtualization is an evolving concept, encompassing a broad range of technologies, tools, and methods, and can bring significant operational benefits to organizations that choose to leverage them. As with any evolving technology, however, the risks also continue to evolve and are often less understood than risks associated with more traditional technologies.

The intent of this Information Supplement is to provide guidance on the use of virtualization in accordance with the Payment Card Industry Data Security Standard (PCI DSS). For the purposes of this paper, all references are made to the PCI DSS version 2.0.

In the first part of this session, we'll cover 4 basic design patterns and how to apply them. These patterns are "Singleton", "Observer", "Proxy" and "POCO".

In the second part of the session we will cover some of the best practices in code and more precisely:
- Code Analysis
- Tip and tricks and Gotchas in your code
- Defensive programming
- Async Framework

WPF introduced a new type of event called Routed Event, used in situations involving the execution of event managers based on the ascending or descending hierarchy of interface elements. The concept of routed event may at first glance seem repellent, until it is understood.

In this video, Ibrahima introduces basic concepts of those types of events.

WPF introduced a new type of event called Routed Event, used in situations involving the execution of event managers based on the ascending or descending hierarchy of interface elements. The concept of routed event may at first glance seem repellent, until it is understood.

In this video, Ibrahima gives an example of the development of Routed Events.

This course is intended for people having an interest in testing web applications. When this course is complete, you'll be able to write tests that effectively test your applications but also to integrate Selenium in your existing testing processes following the good practices that this tool requires.

In this session we will cover two main topics being "Exception handling in code" and "Debugging an application using Visual Studio".

We'll cover the following key concepts:
- Basic concepts
- Exploring the various « Try » block syntaxes
- How can we rethrow an exception?
- Where to handle exception and how to publish them?
- PDB files, how do they work?
- Symbol Server and sources indexing
- Debugging tips and tricks

This course is designed to be delivered in a classroom setting with practical exercices. The presentation material is however a very good introduction to the concepts, process and deliverables of ArchitectureLab.

Developing an ergonomic interface compliant with interfacing standards in terms of margin placement and the positioning or embedding of interface container controls requires a certain technique. In this video, Ibrahima gives an example of the development of an embedded interface via the use of the Grid control container in design mode under Microsoft Expression blend 4.

The StackPanel control container is an interface control used to stack the different controls placed in it based on a specific guideline. In this video, Ibrahima gives an example of the development of a StackPanel.

The WrapPanel control container in WPF is an interface control for docking the various controls placed in it based on a certain position. In this video, Ibrahima gives an example of the development of a WrapPanel.

The DockPanel control container in WPF is an interface control for docking the various controls placed in it based on a certain position. In this video, Ibrahima gives an example of the development of a DockPanel.

Developing an ergonomic interface compliant with interfacing standards in terms of margin placement and positioning of the embedding of interface container controls requires a certain technique. In this video, Ibrahima gives an example of the development of an embedded interface via the use of the StackPanel and DockPanel.

The Control Container Grid is an interface control allowing for various controls placed in its cells based on a certain value assigned to the lines and columns of said control. In this video, Ibrahima gives an example of the different characteristics of this control.

Developing an ergonomic interface compliant with interfacing standards in terms of margin placement and the positioning or embedding of interface container controls requires a certain technique. In this video, Ibrahima gives an example of the development of an embedded interface via the use of the Grid control container in design mode under Microsoft Expression blend 4.

WPF introduced a new type of property called Dependency Property, used in various situations for the application of styles, link automation, animations and other items. The concept of dependency property may at first seem repellent, until it is understood. In this video, Ibrahima introduces the basic concepts for understanding this property.

Attached Properties are types of dependency properties used in different situations to apply styles, automate links, produce animations and other items. They are often used when linking two heterogeneous elements.
In this video, Ibrahima gives an example for understanding AttachedProperties.

This foundation level course provides participants with an understanding of ControlCenter 6.0 and how it is an integral component of EMC's offering. This course provides an overview of ControlCenter terminology, features, architecture, theory of operations, and management. This includes ControlCenter components, navigation, architecture, and environmental management.

This foundation level course provides participants with an understanding of ControlCenter 6.0 and how it is an integral component of EMC's offering. This course provides an overview of ControlCenter terminology, features, architecture, theory of operations, and management. This includes ControlCenter components, navigation, architecture, and environmental management.

This specialization level course provides participants with an understanding of the basic implementation and planning for EMC ControlCenter 6.0. Requirements and considerations for installation and upgrade of ControlCenter 6.0 reviewed in detail. This course is an elective component of the ControlCenter curriculum.

This foundation level course provides participants with an understanding of Symmetrix based Business Continuity solutions for local replication, and how these solutions are an integral component of EMC's offering. This course provides participants with an understanding of TimeFinder terminology, features, architecture, theory of operations, and management. The course covers TimeFinder/Clone, TimeFinder/Snap, and TimeFinder/Mirror functionality. TimeFinder/Clone Emulation is also presented to support Enginuity 5874 with Solutions Enabler 7.0 environments.

This course introduces the EMC Symmetrix Management Console (SMC). SMC is a lightweight and functional stand-alone Symmetrix management tool. Students will learn to install the product in a typical environment and use it to monitor and manage Symmetrix arrays. The design goals and architecture of the product will be covered, and some comparisons given to other EMC Symmetrix management tools. A key part of the course includes recorded examples that will demonstrate how to install and administer Symmetrix Management Console, use it to configure the array, and to perform business continuity operations. These demonstrations support and supplement the details described in the presentation.

ControlCenter StorageScope Reporting is a specialist level class that uses built-in and customizable features to create advanced reporting solutions in a ControlCenter 6.0 environment. SRM Views and "Top 10" lists provide a quick insight to used and available ports as well as fabric information. Built-in StorageScope reports tell users about details about file system usage specified by host or network file systems discovered by ControlCenter. Advanced reporting scenarios utilize the customizable query building tool to perform a variety of tasks. These tasks include identifying host and array files not accessed within 180 days and identifying allocated host storage not used in a file system or volume group. The query builder also allows users to perform chargeback operations against groups in the ControlCenter Console, as well as monitor, manage, and trend raw array capacities. Finally, custom fields are demonstrated to show group membership for hosts.

This course provides participants with the basics about backup to disk in a LAN environment, using NS Series storage systems as the backup destination platform. Students review the underlying characteristics and recommendations, including NS Series optimization using ATA disks.

This foundation level course provides participants with an understanding of EMC NetWorker. The course provides an overview of NetWorker terminology, features, architecture, theory of operations, and management. This includes NetWorker components, and backup and recovery functions. The course supports the EMC Proven Professional Associate certification.

This course provides an overview of new and enhanced features and functionality introduced with the NetWorker 7.4 release. Prior knowledge of NetWorker 7.3 is a prerequisite as this course only focuses on the differences since the 7.3 release.

This foundations level course introduces students to the basic EMC Disk Library (EDL) concepts and terminology, preparing them for further study of installation or implementation procedures. The main functionality of a EMC Disk Library and where it fits within the enterprise is presented. Features, functionality, and hardware/software architecture, up to and including version 3.2 of the emulation code including DL4000 Series is discussed. The course also covers the EMC Disk Libraries with deduplication version 1.2, including DL1500, DL3000. Historic information on older EDL models is given.

This course provides participants with the basics about backup to disk in a SAN environment using CX Series storage systems as the backup destination platform. Students will review the underlying characteristics and recommendations, including CLARiiON CX and Symmetrix DMX systems.

This course introduces students to the concepts and activities performed when integrating EMC NetWorker with different EMC Backup-to-Disk technologies. It starts with an overview of the backup product, its terms, functionality, and options for Backup-to-Disk environments. The course shows how to integrate the application with both Disk-aware and Tape emulation scenarios utilizing EMC technology (Celerra, CLARiiON, Symmetrix, and EMC Disk Library as backup destination devices).

This course provides participants with an introduction to EMC Avamar. It includes an overview of Avamar terminology, features, and components, including Avamar backup and restore functions. The course also reviews Avamar tools for monitoring and maintaining an Avamar system.

This course provides participants with an introduction to the EMC Data Protection Advisor product, version 5.0, including positioning, architecture and technical information. The course also covers how data gathering works in DPA.

This hacker tooltalk from the Fujitsu Edmonton Security Lab explores the Kismet open source Wi-Fi analysis tool. Learn how to set up a low cost Wi-Fi hacker lab, sniff unencrypted Wi-Fi packets without detection, and even crack WEP keys with Kismet.

The SSL / TLS protocol is arguably the most important encryption protocol in use today - protecting everything from our Facebook session to our online banking transactions. This brief presentation from the Fujitsu Edmonton Security lab explores why the SSL protocol is designed the way it is, provides some advise for users and developers, and finishes with a lesson in security architecture using card magic.

The general objective for this learning event is to provide the participants with an overview of the expected skills and behaviors required from all Fujitsu consultants having to share their professional expertise with our valued customers

This document presents the tools available on the standard Java platform (API) for access to relational databases (JPA). The JPA platform was successfully adopted by many major industry leaders, contrary to proprietary platforms, which limit portability of integration in existing applications.

This learning event provides an overview of ProductivityCentre domain. It emphasizes why ProductivityCentre is designed the way it is, and how it can help you in delivering, operating and maintaining information systems.

This course aims to familiarize you with the features and functionalities of Deliverable Assistant. The course provides interactive activities, such as demos and practices that help you become familiar with DA interface and enable you to use DA as per your requirements.

As a global IT infrastructure provider, Fujitsu offers a complete range of servers designed to fill any role in today's business. Whether your business requires affordable entry-level servers, compact and scalable blade systems, or advanced multiprocessor servers capable of handling the most demanding data center applications, the PRIMERGY® line delivers Intel®Architecture servers with the rock-solid reliability and industry-leading performance you need.

The Fujitsu U-Scan® Genesis offers retailers new features, flexibility, scalability, reliability and usability. With its new compact, space-saving footprint, U-Scan Genesis is expected to rapidly expand into new markets in addition to the traditional grocery sector, where Fujitsu has led for many years. Retail formats from larger stores such as mass merchandisers, do-it-yourself (DIY) and warehouse stores, to more space-constrained convenience stores, drugstores discount and specialty retail stores, find the new features and compact design a significant improvement over other self-checkout options.

PFU (Fujitsu compagny) offers a full range of Interactive Kiosks and a unique Kiosk Integration Platform which provides enterprises and developers a simple approach to deployment that accelerates time to market and reduces costs over the entire kiosk lifecycle

Course code: KAA03000
This introductory course on the Fujitsu Way is designed to reconfirm our strategic direction and the shared values we, as employees of the Fujitsu Group, should uphold. The course covers the history of the Fujitsu Group and the key elements of the Fujitsu Way.

Course code: LBA03000
ProductivityCentre is the Macroscope module covering the System Delivery and Maintenance Life Cycle. This course provides an introduction to the major aspects of the system maintenance and operation support processes of ProductivityCentre.

This is a Macroscope e-Learning module addressed to anyone who wants to improve its understanding of the agile approach in Macroscope. Several questions and exercises will let you test your knowledge of the subject. You will also find notes, tips and frequently asked questions.

Fujitsu was chosen by Whitbread to provide an outsourced solution that includes a fully managed service for wide area network (WAN) links, ranging from ISDN to Megastream Ethernet, to all of the company's extended family of brands in over 1,600 locations in the UK.